Your IoT’s not sick – Someone just turned it into a brick! A 14-year-old hacker created a new strain of malware called “Silex malware” which bricked over 4000 IoT devices in the span of a few hours. Once again, the world is shocked to find that IoT devices are vulnerable to all kinds of attacks.…

After reigning for 8+ years as the standard for mobile broadband, 4G networks are about to be dethroned by 5G. 5G networks promise dramatically faster speeds, lower latency and massive machine to machine communications – but is this enough to ensure happy consumers? Back in 2009, 4G was launched with the promise of delivering faster…

Last week, Russian media was hit with news about massive DNS (Domain Name System) attacks on Yandex, the country’s biggest technology company and local giant of internet search – essentially, the Google of Russia. The network attacks exploited vulnerabilities in the block-list system of Roskomnadzor, Russia’s state censor, that the government uses to ban sites…

Where is Your CSP on the Closed Loop Automation Journey? Automation in telecom is not new. But it has evolved. Initially, it was about being more efficient at solving well-defined problems – the known knowns. Solutions like Root Cause Analysis that reduced tens of thousands of NOC alarms to a single “parent alarm”, which highlighted…

MWC went by so fast that you may have missed some of the highlights. Luckily, we’ve compiled the following takeaways from the Barcelona conference. With apologies to Don Adams, it really is time to Get Smart! From Smart Cities and Smart Homes, to Smart Mobility and Smart Wellness, you might think that we’ve moved out…

(The following article is reprinted from The Fast Mode) A growing number of players, from Mobile Network Operators to Mobile Virtualized Network Operators, are vying for their share of today’s competitive telecoms market. With brand loyalty a thing of the past, only those telecom operators, who can identify new ways to add value to…

(The following article is reprinted from Brilliance Security Magazine) Consumer cybersecurity needs have significantly changed over the past years. With the rising global dependence on smart devices for everything from waking up in the morning to dimming the lights at night, it is safe to say that smart homes are the new normal. However, there…

Cryptocurrency Hijacking Cryptocurrency hijacking, or “cryptojacking” is one of the major threats faced by Enterprise IT teams today, and probably the most underestimated. Cryptojacking involves the covert, illegal use of targeted computing resources to mine cryptocurrencies. Cryptocurrency mining requires massive processing power to solve complex algorithms as part of the blockchain validation mechanism. This…

Five years ago, a “hacktivist” group of cyber-disruptors united to attack the Internet infrastructure and websites of the State of Israel. The initial date of that attack was the 7th of April 2013, the eve of Israel’s annual Holocaust Memorial Day, and they have continued to target Israel every year on the anniversary of…

True story. All I wanted was to upgrade our home thermostat to a smart one. What did I end up with? A lecture about IoT security. Who gave me the lecture? You won’t guess—my wife! Smart and educated, my wife is well-versed in what’s going on in the world through reading newspapers and watching…